메뉴 건너뛰기




Volumn 3876 LNCS, Issue , 2006, Pages 245-264

Polylogarithmic private approximations and efficient matching

Author keywords

Communication complexity; Nearest neighbor; Private approximations; Secure multiparty computation

Indexed keywords

COMMUNICATION COMPLEXITY; NEAREST NEIGHBOR; PRIVATE APPROXIMATIONS; SECURE MULTIPARTY COMPUTATION;

EID: 33745565439     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (69)

References (33)
  • 1
    • 0029719644 scopus 로고    scopus 로고
    • The space complexity of approximating the frequency moments
    • N. Alon, Y. Matias, and M. Szegedy. The space complexity of approximating the frequency moments, STOC, 1996.
    • (1996) STOC
    • Alon, N.1    Matias, Y.2    Szegedy, M.3
  • 2
    • 27544439829 scopus 로고    scopus 로고
    • Estimating the relative size and overlap of public web search engines
    • K. Bharat and A. Broder. Estimating the relative size and overlap of public web search engines, WWW, 1998.
    • (1998) WWW
    • Bharat, K.1    Broder, A.2
  • 3
    • 4243152206 scopus 로고    scopus 로고
    • Reducing the servers computation in private information retrieval: PIR with preprocessing
    • A. Beimel, Y. Ishai, T. Malkin. Reducing the servers computation in private information retrieval: PIR with preprocessing, CRYPTO, 2000.
    • (2000) CRYPTO
    • Beimel, A.1    Ishai, Y.2    Malkin, T.3
  • 5
    • 0003700684 scopus 로고    scopus 로고
    • One-round secure computation and secure autonomous mobile agents
    • C. Cachin, J. Camenisch, J. Kilian and J. Müller. One-round secure computation and secure autonomous mobile agents, ICALP, 2000.
    • (2000) ICALP
    • Cachin, C.1    Camenisch, J.2    Kilian, J.3    Müller, J.4
  • 6
    • 0001090406 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • C. Cachin, S. Micali and M. Stadler. Computationally private information retrieval with polylogarithmic communication, Eurocrypt, 1999.
    • (1999) Eurocrypt
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 8
    • 0003701129 scopus 로고    scopus 로고
    • Private information retrieval by keywords
    • Department of Computer Science, Technion
    • B. Chor, N. Gilboa and M. Naor, Private information retrieval by keywords, Technical Report CS0917, Department of Computer Science, Technion, 1997.
    • (1997) Technical Report , vol.CS0917
    • Chor, B.1    Gilboa, N.2    Naor, M.3
  • 13
    • 12244263240 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • M. Freedman, K. Nissim and B. Pinkas. Efficient private matching and set intersection, Eurocrypt, 2004.
    • (2004) Eurocrypt
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 14
    • 26444451487 scopus 로고    scopus 로고
    • On secure scalar product computation for privacy-preserving data mining
    • B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen. On secure scalar product computation for privacy-preserving data mining, ICISC, 2004.
    • (2004) ICISC
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikainen, T.4
  • 15
    • 33745533362 scopus 로고
    • Construction of a pseudorandom generator from any one-way function
    • International Computer Science Institute
    • J. Hastad, R. Impagliazzo, L. A. Levin, and M. Luby. Construction of a pseudorandom generator from any one-way function, Technical Report TR-91-068, International Computer Science Institute, 1991.
    • (1991) Technical Report , vol.TR-91-068
    • Hastad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 16
    • 0031624875 scopus 로고    scopus 로고
    • Protecting data privacy in private information retrieval schemes
    • Y. Gertner, Y. Ishai, E. Kushilevitz and T. Malkin, Protecting data privacy in private information retrieval schemes, STOC, 1998.
    • (1998) STOC
    • Gertner, Y.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 21
    • 0024770898 scopus 로고
    • One-way functions are essential for complexity-based cryptography
    • R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography, FOCS, 1989.
    • (1989) FOCS
    • Impagliazzo, R.1    Luby, M.2
  • 23
    • 0031644241 scopus 로고    scopus 로고
    • Approximate nearest neighbors: Towards removing the curse of dimensionality
    • P. Indyk and R. Motwani. Approximate nearest neighbors: towards removing the curse of dimensionality, STOC, 1998.
    • (1998) STOC
    • Indyk, P.1    Motwani, R.2
  • 24
    • 33745541831 scopus 로고    scopus 로고
    • Polylogarithmic private approximations and efficient matching
    • P. Indyk and D. Woodruff. Polylogarithmic private approximations and efficient matching, ECCC, Technical Report TR05-117, 2005.
    • (2005) ECCC, Technical Report , vol.TR05-117
    • Indyk, P.1    Woodruff, D.2
  • 25
    • 0031636499 scopus 로고    scopus 로고
    • Efficient search for approximate nearest neighbor in high dimensional spaces
    • E. Kushilevitz, R. Ostrovsky and Y. Rabani. Efficient search for approximate nearest neighbor in high dimensional spaces, STOC, 1998.
    • (1998) STOC
    • Kushilevitz, E.1    Ostrovsky, R.2    Rabani, Y.3
  • 26
    • 0003625004 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas. Privacy preserving data mining, Crypto, 2000.
    • (2000) Crypto
    • Lindell, Y.1    Pinkas, B.2
  • 27
    • 0003270948 scopus 로고
    • Asymptotic theory of finite dimensional normed spaces
    • Springer Verlag
    • V.D. Milman and G. Schechtman. Asymptotic Theory of Finite Dimensional Normed Spaces. Lecture Notes in Mathematics, 1200, Springer Verlag, 1986
    • (1986) Lecture Notes in Mathematics , vol.1200
    • Milman, V.D.1    Schechtman, G.2
  • 28
    • 85048334721 scopus 로고    scopus 로고
    • A new public key cryptosystem
    • D. Naccache and J. Stern. A new public key cryptosystem, Eurocrypt, 1997.
    • (1997) Eurocrypt
    • Naccache, D.1    Stern, J.2
  • 29
    • 33745578428 scopus 로고    scopus 로고
    • Communication complexity and secure function evaluation
    • M. Naor and K. Nissim. Communication complexity and secure function evaluation, STOC, 2001.
    • (2001) STOC
    • Naor, M.1    Nissim, K.2
  • 30
    • 0003147279 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation, STOC, 1999.
    • (1999) STOC
    • Naor, M.1    Pinkas, B.2
  • 31
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes, Eucrocrypt, 1999.
    • (1999) Eucrocrypt
    • Paillier, P.1
  • 32
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Aiken Computation Lab
    • M. Rabin. How to exchange secrets by oblivious transfer. Technical report TR81, Aiken Computation Lab, 1981.
    • (1981) Technical Report , vol.TR81
    • Rabin, M.1
  • 33
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • A, C. Yao. Protocols for secure computations, FOCS, 1982.
    • (1982) FOCS
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.